Important Dates

Research and Industrial Papers (Extended):
Abstract Deadline:
January 14, 2009
Full Paper Deadline:
January 19, 2009
Demonstrator Proposals:
Submission Deadline: February 27, 2009
Workshop and Tutorial Proposals:
Submission Deadline: January 12, 2009


General Chairs
Elisa Bertino
Yücel Karabulut

Program Chairs
Elena Ferrari
Ninghui Li

Workshop Chair
Anupam Datta

Tutorial Chair
Yuko Murayama

Demonstrator Chair
Theo Dimitrakos

Website Chair
Qun Ni


Sponsors International Federation for Information Processing SAP Research Center for Education and Research in Information Assurance and Security

IFIPTM 2009 – Program

Tuesday June 16th
            Registration: 8:30am-9:00am
            Workshops: MIST
            Location: Lawson Computer Science Building (LSWN) 1142
            Schedule: 9am-12:30pm

            Opening remark: 8:50am-9:00am

            Session1: 9:00am-10:30am

            - Insider Theft of Intellectual Property in Organizations:
            A Preliminary Model (Andrew Moore, Dawn Cappelli, Tom Caron, Eric Shaw and Randall Trezciak)

            - Insider Behavior: An Analysis of Decision under Risk (Fariborz Farahmand and Eugene Spafford)

            - Accumulating Evidence of Insider Attacks (Howard Chivers, Siraj Shaikh, Philip Nobles, John Clark and Hao Chen)

            Coffee Break: 10:30am-11:00am

            Session 2: 11:00am-12:30pm

            - A Exploratory Study on R&D Strategies in Industrial Technology Security (Hangbae Chang, Jonggu Kang, Hyukjun Kwon and Ilsun You)

            - A Method to Evaluate Uncertain and Conflicting Trust and Authenticity Statements (Andreas Gutscher)

            - Manual vs. Automated Vulnerability Assessment: A Case Study (James A. Kupsch and Barton P. Miller)

            Lunch break 12:30pm-1:30pm

            Tutorial: Online Trust and Reputation Systems (Audun Josang)
            Schedule: 1:30pm-5pm
            Free for all workshop and conference attendees (Tutorial slides)

Wednesday June 17th
            Registration: 7:30am-9:00am
            Location: Lawson Computer Science Building (LSWN) 1142


            8:30am-9:00am: Conference Welcome and Program Overview
            (Yuecel Karabulut, Elisa Bertino, Ninghui Li, Elena Ferrari, Randy Bond)

            9:00am-10:30am Keynote Talk – Marianne Winslett (UIUC) (Talk Slides)
            Session Chair:          Ninghui Li

            10:30am-11:00am Coffee Break

            11:00am-12:00pm Session 1: Social Aspects and Usability
            Session Chair:          Yuko SJ Murayama

                        Radoslaw Nielek, Aleksander Wawer and Adam Wierzbicki.
                        “Spiral of Hatred: Social Effects in Buyer-seller Cross-comments Left on Internet Auctions

                        Kemal Bicakci, Mustafa Yuceel, Burak Erdeniz, Hakan Gurbaslar and Nart Bedin Atalay.
                        “Graphical Passwords as Browser Extension: Implementation and Usability Study

            12:00pm-1:30pm Lunch break (Lunch at Purdue Memorial Union Faculty Lounge)

            1:30pm -3:00pm Session 2: Trust Reasoning and Processing
            Session Chair:          Christian Damsgaard Jensen

                        Georgios Pitsilis.
                        “Trust-enhanced Recommender Systems for Efficient On-line collaboration

                        Mohamed Ahmed and Stephen Hailes.
                        “Towards Understanding the Requirements and Limitations of Reputation-Based Systems

                        Shouhuai Xu, Ravi Sandhu, and Elisa Bertino
                        “TIUPAM: A Framework for Trustworthiness-centric Assured Information Sharing

            3:00pm-3:30pm Coffee break

            3:30pm-5:00pm Session 3: Data Security
            Session Chair:          Sandro Etalle

                        Christian Damsgaard Jensen.
                        “Security in Wiki-Style Authoring Systems

                        Federico Stagni, Alvaro Arenas, Benjamin Aziz and Fabio Martinelli.
                        “On Usage Control in Data Grids

                        Tzvi Chumash and Danfeng Yao.
                        “Detection and Prevention of Insider Threats in Database Driven Web Services”        

            5:00pm Reception – Lawson Common

            5:45pm-7:00pm Keynote Talk – Michael Nowak (USAF AFRL/RYT)
            Session Chair:          Elisa Bertino

Thursday June 18th

            9:00am-10:30am Keynote Talk – Eugene Spafford (Purdue)
            Session Chair:          Randy Bond

            10:30am-11:00am Coffee Break

            11:00am-12:00pm Panel: Social Trust and Computational Norms
            This panel session will discuss why computational trust needs to step back and rethink itself
            in terms of what people *really* do in society around trust, and where that might have
            implications not only for reputation systems/trust management but also for security and
            secure management.

            Panel Chair: Stephen Marsh (Communications Research Centre, Canada)
            D. Harrison McKnight
            Stephane Lo Presti
            Christian Damsgard Jensen

            12:00pm-1:30pm Lunch break (Lunch at Wiley Dining Court)

            1:30pm -2:30pm Session 4:Risk Assessment
            Session Chair:          Peter  Herrmann

                        Atle Refsdal and Ketil Stolen.
                        “Employing Key Indicators to Provide a Dynamic Risk Picture with a Notion of Confidence”            

                        Camilo Viecco and Jean Camp.
                        “A Risk Based Approach To Limit The Effects of Covert Channels for Internet Sensor Data Aggregators for Sensor Privacy

            2:30pm-3:00pm Coffee break

            3:00pm-4:00pm Session 5:Enhancements to Subjective Logic
            Session Chair:          Yuecel Karabulut

                        Mozhgan Tavakolifard, Peter Herrmann and Svein Johan Knapskog.
                        Inferring Trust based on Similarity with TILLIT

                        Sunitha Ramanujam, Anubha Gupta, Latifur Khan, Steven Seida and Bhavani Thuraisingham.
                        “A Relational Wrapper for RDF Reification

            Social Event at the Eiteljorg Museum in Indianapolis Buses depart at 4:45pm

Friday June 19th

            9:00am-10:15am Demo paper presentations
            Demo Chair:             Theo Dimitrakos

                        Syed Naqvi and Paolo Mori.
                        “Security and Trust Management for Virtual Organisations : GridTrust Approach

                        David Brossard and Juan Luis Prieto Martinez
                        “A Virtual Hosting Environment for Distributed Online Gaming

                        David Brossard and Maurizio Colombo.                     
                        “Common Capabilities for Trust & Security in Service Oriented Infrastructures

                        Pierre de Leusse, David Brossard                   
                        “Distributed Systems Security Governance, a SOA Based Approach
                        Thomas Lefevre, Christian Damsgaard Jensen, and Thomas Rune Korsgaard.
                        “WRS: the Wikipedia Recommender System

            10:15am-10:45am Coffee Break + Demo Booth

            10:45am-12:15pm Session 6:  Simulation of Trust and Reputation Systems
            Session Chair:          Steve Marsh

                        Reid Kerr and Robin Cohen.
                        “An Experimental Testbed for Evaluation of Trust and Reputation Systems

                        Jonas Andrulis, Jochen Haller, Christof Weinhardt and Yuecel Karabulut.
                        “Evaluating the STORE Reputation System in Multi-Agent Simulations

                        Marie Elisabeth Gaup Moe, Bjarne Emil Helvik and Svein Johan Knapskog.
                        “Comparison of the Beta and the Hidden Markov Models of Trust in Dynamic Environments”

            12:15pm-1:30pm Lunch break + Demo Booth (Lunch on the Memorial Mall Lawn)

            1:30pm-3:00pm Session 7:Information Sharing
            Session Chair:          Stephane Lo-Presti

                        Omar Hasan, Lionel Brunie, Jean-Marc Pierson and Elisa Bertino.
                        “Elimination of Subjectivity from Trust Recommendation

                        Adam J. Lee, Marianne Winslett and Kenneth J. Perano.
                        “TrustBuilder2: A Reconfigurable Framework for Trust Negotiation

                        Mozhgan Tavakolifard, Peter Herrmann and Pinar Ozturk.
                        “Analogical Trust Reasoning

            3:00pm -4:00pm Business meeting and conference conclusion